Top 10 Keyboard Shortcuts for Microsoft Business Apps

Microsoft apps such as Word, Edge, and Outlook are a business mainstay. When using these apps, employees can take advantage of keyboard shortcuts to save time. Here are 10 of the most handy, easy-to-remember shortcuts.

What You Need to Know about the Zerologon Vulnerability

A critical vulnerability in the Microsoft Netlogon Remote Protocol is leaving some companies open to attack. Here is what you need to know to determine if your company is at risk from the Zerologon vulnerability and, if so, what you can do to protect it.

Smishing and Vishing and Whaling — Oh My

Smishing, vishing, and whaling might sound ominous, but they are simply terms used to describe different types of phishing attacks. Find out how these attacks differ from the classic phishing scam.

New Tactic Is Bringing Ransomware Extortion to a Whole New Level

Cybergangs continually look for new ways to make their ransomware campaigns more effective, but sometimes they just seem to fall in their lap. Learn how ransomware attacks in South Africa’s largest city, Johannesburg, eventually led to a new extortion tactic that is already paying off.

Securing APIs for Better Business

Creating a secure architecture while developing APIs (Application Programming Interface) is critical for prevention against future cyberattacks.